+

US8149089B2 - Method for unlocking a locked computing device and computing device thereof - Google Patents

Method for unlocking a locked computing device and computing device thereof Download PDF

Info

Publication number
US8149089B2
US8149089B2 US12/275,221 US27522108A US8149089B2 US 8149089 B2 US8149089 B2 US 8149089B2 US 27522108 A US27522108 A US 27522108A US 8149089 B2 US8149089 B2 US 8149089B2
Authority
US
United States
Prior art keywords
computing device
biometric information
facial profile
predetermined
predetermined requirement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/275,221
Other versions
US20090160609A1 (en
Inventor
Jian-Liang Lin
John C. Wang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HTC Corp
Original Assignee
HTC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HTC Corp filed Critical HTC Corp
Assigned to HTC CORPORATION reassignment HTC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LIN, JIAN-LIANG, WANG, JOHN C.
Publication of US20090160609A1 publication Critical patent/US20090160609A1/en
Application granted granted Critical
Publication of US8149089B2 publication Critical patent/US8149089B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to a method for unlocking a locked computing device and, more specifically, to a method that utilizes biological recognition technology to unlock a locked computing device.
  • a method for unlocking a locked computing device comprises obtaining biometric information utilizing the computing device, determining whether the biometric information meets a predetermined requirement, and unlocking the computing device when the biometric information obtained meets the predetermined requirement.
  • a computing device comprises a sensor utilized for obtaining biometric information, wherein the computing device is for determining whether the biometric information meets a predetermined requirement, and for unlocking the computing device when the biometric information obtained meets the predetermined requirement.
  • FIG. 1 shows a flowchart of a method for unlocking a locked computing device according to an embodiment of the present invention.
  • FIG. 2 shows a locked computing device in a user scenario according to an embodiment of the present invention.
  • a method for unlocking a locked computing device utilizes obtained biological information to determine whether to unlock the locked computing device. When a predetermined requirement is met, the method automatically unlocks the device, thus circumventing the need for the user to unlock the device manually.
  • FIG. 1 shows a flowchart for unlocking a locked computing device according to an embodiment of the present invention.
  • the steps of the process flowchart need not be in the exact order shown and need not be contiguous; that is, other steps can be intermediate.
  • the embodiment of the method according to the present invention includes the following steps:
  • Step 110 User touches locked device.
  • Step 120 Camera sensor captures image of external environment.
  • Step 130 Detect facial profile in image.
  • Step 140 Is there a facial profile in image? If yes, go to Step 150 ; if no, proceed to Step 180 .
  • Step 150 Is specific user authentication required? If yes, go to Step 160 ; if no, proceed to Step 190 .
  • Step 160 Apply facial recognition authentication.
  • Step 170 Was facial recognition authentication a success? If yes, go to Step 190 ; if no, go to Step 180 .
  • Step 180 Device remains locked.
  • Step 190 Device is unlocked.
  • FIG. 2 shows a locked computing device in an exemplary user scenario according to an embodiment of the present invention.
  • the exemplary flow shown in FIG. 2 and any alternative design(s) thereof are performed upon the computing device 220 .
  • the user 210 is holding the computing device 220 .
  • the computing device 220 comprises a camera sensor 230 for obtaining biometric information, and a display 240 for providing feedback to the user 210 .
  • the computing device 220 is a mobile phone, such as a Smartphone, a PDA phone, or a Touch phone.
  • this is for illustrative purposes only, and is not meant to be taken as a limitation of the present invention.
  • Step 110 begins as the user 210 touches the locked computing device 220 or manipulates it in a manner by which the computing device 220 interprets as a possible request to unlock.
  • One example of such a manipulation could be via a motion sensor or accelerometer or other similar means.
  • the locked computing device 220 then obtains biometric information, Step 120 , by using a camera sensor 230 to capture an image of the external environment in this scenario 200 .
  • the computing device 220 determines in Step 130 whether the biometric information meets a predetermined requirement; in this scenario 200 , the biometric information obtained is a facial profile of user 210 , and the predetermined requirement is whether the obtained image comprises a facial profile of a human face (such as that of user 210 ).
  • the computing device 220 proceeds to Step 180 and remains locked; when the predetermined requirement is met, then the process continues to Step 150 .
  • Step 150 the computing device 220 determines whether specific user authentication is required; this is a user selectable setting in one embodiment of the present invention and would be predetermined by the user 210 (for example, during configuration of the computing device).
  • Step 190 is executed, and the computing device 220 is unlocked.
  • this embodiment requires only that a human facial profile exists in the obtained biometric information, so if the locked computing device 220 is accidentally activated in Step 110 (say, while still in a pocket or purse), the image captured by the camera sensor 230 will not contain a facial profile, and will remain locked in Step 180 .
  • a practical application of this embodiment is to simply prevent accidental keypresses or operation of the computing device 220 , which can result in additional power savings.
  • the specific user authentication of Step 150 is required.
  • the locked computing device 220 applies facial recognition authentication in Step 160 .
  • the user 210 has predetermined that not only should there be a facial profile in the image obtained by camera sensor 230 , but that it should also match a predetermined facial profile of an authorized user of the computing device 220 . In other words, it should not be just anyone's face, but the face of a user who is authorized to use the computing device 220 . This can be considered akin to a secret password or other personal security information (such as a fingerprint).
  • Step 170 the result of the facial recognition authentication of Step 160 is evaluated.
  • Step 190 When the facial recognition operation successfully matches a predetermined facial profile of an authorized user 210 of the computing device 220 , the computing device is then unlocked in Step 190 . When the facial recognition operation does not successfully find a match, then Step 180 is executed, leaving the computing device 220 in a locked state.
  • One exemplary application of this second embodiment is in preventing unauthorized use of the computing device 220 , for example, in case the computing device 220 is misplaced or stolen.
  • FIG. 1 merely serves as one exemplary embodiment of the present invention.
  • Other alternative designs without departing from the spirit of the present invention is feasible.
  • the facial profile obtained in Step 140 is added as a new authorized facial profile of the computing device 220 and then the computing device 220 is unlocked if the user enters a specific password; otherwise, the flow proceeds with Step 180 , leaving the computing device 220 in a locked state. This also falls within the scope of the present invention.
  • the locked computing device 220 includes a fingerprint reader (touch screen 240 ) utilized for capturing a fingerprint image of a finger 250 of the user 210 to thereby obtain the biometric information. If specific user authorization is (step 150 ) is not enabled, the computing device 220 unlocks upon recognition of the fingerprint image. On the other hand, if further security is required, the locked computing device 220 can also check to see if the fingerprint image matches a predetermined fingerprint image of an authorized user of the computing device and only unlock upon the fingerprint image matching that of the authorized user.
  • a fingerprint reader touchscreen 240
  • the computing device 220 unlocks upon recognition of the fingerprint image.
  • the locked computing device 220 can also check to see if the fingerprint image matches a predetermined fingerprint image of an authorized user of the computing device and only unlock upon the fingerprint image matching that of the authorized user.
  • the present invention provides a method and related system for unlocking locked computing devices without requiring the user to manipulate a plurality of icons or keypresses each time, and without requiring the authorized user to key in a password each time, by utilizing biometric information of the user (such as a facial profile or facial recognition).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A method for unlocking a locked computing device includes obtaining biometric information utilizing the computing device, determining whether the biometric information meets a predetermined requirement, unlocking the computing device when the biometric information obtained meets the predetermined requirement, and maintaining a locked status of the computing device when the biometric information does not meet the predetermined requirement. A computing device includes a sensor utilized for obtaining biometric information, wherein the computing device is for determining whether the biometric information meets a predetermined requirement, for unlocking the computing device when the biometric information obtained meets the predetermined requirement, and for maintaining a locked status of the computing device when the biometric information does not meet the predetermined requirement.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a method for unlocking a locked computing device and, more specifically, to a method that utilizes biological recognition technology to unlock a locked computing device.
2. Description of the Prior Art
As the use of computing devices permeate our daily lives, especially with the recent popularity of mobile computing devices, protecting and securing the use of and the data stored on those devices is becoming increasingly important.
Many computing devices have implemented lock mechanisms to prevent the unauthorized use and/or accidental key inputs. These lock mechanisms typically require the user to type in a password and/or manipulate icons on screen menus each time they want to unlock the devices. Simply (but not only) due to the frequency of use for these devices, many users find these steps to be unnecessarily repetitive and time consuming, and as a result, many users often choose not to lock their devices. This results in much higher probabilities of the device registering erroneous inputs and of the device being left susceptible to unauthorized use and/or malicious security violations.
Thus, there is a need for a method that provides users with an easier and more convenient way of unlocking their computing devices.
SUMMARY OF THE INVENTION
It is therefore an objective of the present invention to solve the aforementioned problems, and to provide a method for unlocking a locked computing device without requiring the user to manipulate a plurality of icons or keypresses each time and a computing device thereof.
It is another objective of the present invention to provide a method and related computing device for unlocking locked computing devices without requiring the authorized user to key in a password each time.
A method for unlocking a locked computing device comprises obtaining biometric information utilizing the computing device, determining whether the biometric information meets a predetermined requirement, and unlocking the computing device when the biometric information obtained meets the predetermined requirement.
A computing device comprises a sensor utilized for obtaining biometric information, wherein the computing device is for determining whether the biometric information meets a predetermined requirement, and for unlocking the computing device when the biometric information obtained meets the predetermined requirement.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and descriptions of the present invention will be described hereinafter which form the subject of the claims of the present invention. It should be appreciated by those skilled in the art that the conception and specific embodiments disclosed may be readily utilized as a basis for modifying or designing other structures or processes for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims.
These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 shows a flowchart of a method for unlocking a locked computing device according to an embodiment of the present invention.
FIG. 2 shows a locked computing device in a user scenario according to an embodiment of the present invention.
Corresponding numerals and symbols in the different figures generally refer to corresponding parts unless otherwise indicated. The figures are drawn to clearly illustrate the relevant aspects of the preferred embodiments and are not necessarily drawn to scale.
DETAILED DESCRIPTION
Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, manufacturers may refer to a component by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . ” The terms “couple” and “couples” are intended to mean either an indirect or a direct electrical connection. Thus, if a first device couples to a second device, that connection may be through a direct electrical connection, or through an indirect electrical connection via other devices and connections.
In the disclosed invention, a method for unlocking a locked computing device utilizes obtained biological information to determine whether to unlock the locked computing device. When a predetermined requirement is met, the method automatically unlocks the device, thus circumventing the need for the user to unlock the device manually.
Please refer to FIG. 1, which shows a flowchart for unlocking a locked computing device according to an embodiment of the present invention. Provided that substantially the same result is achieved, the steps of the process flowchart need not be in the exact order shown and need not be contiguous; that is, other steps can be intermediate. The embodiment of the method according to the present invention includes the following steps:
Step 110: User touches locked device.
Step 120: Camera sensor captures image of external environment.
Step 130: Detect facial profile in image.
Step 140: Is there a facial profile in image? If yes, go to Step 150; if no, proceed to Step 180.
Step 150: Is specific user authentication required? If yes, go to Step 160; if no, proceed to Step 190.
Step 160: Apply facial recognition authentication.
Step 170: Was facial recognition authentication a success? If yes, go to Step 190; if no, go to Step 180.
Step 180: Device remains locked.
Step 190: Device is unlocked.
FIG. 2 shows a locked computing device in an exemplary user scenario according to an embodiment of the present invention. The exemplary flow shown in FIG. 2 and any alternative design(s) thereof are performed upon the computing device 220. In the user scenario 200, the user 210 is holding the computing device 220. The computing device 220 comprises a camera sensor 230 for obtaining biometric information, and a display 240 for providing feedback to the user 210. In this exemplary embodiment, the computing device 220 is a mobile phone, such as a Smartphone, a PDA phone, or a Touch phone. However, this is for illustrative purposes only, and is not meant to be taken as a limitation of the present invention.
Please refer to both FIG. 1 and FIG. 2 together. From FIG. 1, Step 110 begins as the user 210 touches the locked computing device 220 or manipulates it in a manner by which the computing device 220 interprets as a possible request to unlock. One example of such a manipulation could be via a motion sensor or accelerometer or other similar means. The locked computing device 220 then obtains biometric information, Step 120, by using a camera sensor 230 to capture an image of the external environment in this scenario 200. Then the computing device 220 determines in Step 130 whether the biometric information meets a predetermined requirement; in this scenario 200, the biometric information obtained is a facial profile of user 210, and the predetermined requirement is whether the obtained image comprises a facial profile of a human face (such as that of user 210). When the obtained biometric information (facial profile) does not meet the requirement, the computing device 220 proceeds to Step 180 and remains locked; when the predetermined requirement is met, then the process continues to Step 150.
From Step 150, the computing device 220 determines whether specific user authentication is required; this is a user selectable setting in one embodiment of the present invention and would be predetermined by the user 210 (for example, during configuration of the computing device). When it is not required, Step 190 is executed, and the computing device 220 is unlocked. In the facial profile example, this embodiment requires only that a human facial profile exists in the obtained biometric information, so if the locked computing device 220 is accidentally activated in Step 110 (say, while still in a pocket or purse), the image captured by the camera sensor 230 will not contain a facial profile, and will remain locked in Step 180. Please note that a practical application of this embodiment is to simply prevent accidental keypresses or operation of the computing device 220, which can result in additional power savings.
In a second embodiment, the specific user authentication of Step 150 is required. Given the further requirement in Step 150, the locked computing device 220 applies facial recognition authentication in Step 160. In the example presented, the user 210 has predetermined that not only should there be a facial profile in the image obtained by camera sensor 230, but that it should also match a predetermined facial profile of an authorized user of the computing device 220. In other words, it should not be just anyone's face, but the face of a user who is authorized to use the computing device 220. This can be considered akin to a secret password or other personal security information (such as a fingerprint). Moving forward, in Step 170, the result of the facial recognition authentication of Step 160 is evaluated. When the facial recognition operation successfully matches a predetermined facial profile of an authorized user 210 of the computing device 220, the computing device is then unlocked in Step 190. When the facial recognition operation does not successfully find a match, then Step 180 is executed, leaving the computing device 220 in a locked state. One exemplary application of this second embodiment is in preventing unauthorized use of the computing device 220, for example, in case the computing device 220 is misplaced or stolen.
The flow shown in FIG. 1 merely serves as one exemplary embodiment of the present invention. Other alternative designs without departing from the spirit of the present invention is feasible. For example, in an alternative design, when the specific user authentication is enabled, and the facial recognition operation does not successfully find a match (i.e., the obtained facial profile does not match a predetermined facial profile of any existing authorized user of the computing device 220), the facial profile obtained in Step 140 is added as a new authorized facial profile of the computing device 220 and then the computing device 220 is unlocked if the user enters a specific password; otherwise, the flow proceeds with Step 180, leaving the computing device 220 in a locked state. This also falls within the scope of the present invention.
Please note that there can exist a plurality of predetermined facial profiles of a plurality of authorized users for the computing device 220. In other words, more than one user can be set as an authorized user of the computing device 220; this also falls within the scope of the present invention. Furthermore, one variation on the above method that obeys the spirit of the present invention allows any of the plurality of predetermined facial profiles for any of the plurality of authorized users to return a successful match, and subsequently will unlock the computing device 220.
After reviewing this embodiment of the present invention, other applications and implementations will be obvious to those skilled in the art, and should be included within the scope of the present invention.
For example, in another embodiment of the present invention, the locked computing device 220 includes a fingerprint reader (touch screen 240) utilized for capturing a fingerprint image of a finger 250 of the user 210 to thereby obtain the biometric information. If specific user authorization is (step 150) is not enabled, the computing device 220 unlocks upon recognition of the fingerprint image. On the other hand, if further security is required, the locked computing device 220 can also check to see if the fingerprint image matches a predetermined fingerprint image of an authorized user of the computing device and only unlock upon the fingerprint image matching that of the authorized user.
From the above disclosure, the present invention provides a method and related system for unlocking locked computing devices without requiring the user to manipulate a plurality of icons or keypresses each time, and without requiring the authorized user to key in a password each time, by utilizing biometric information of the user (such as a facial profile or facial recognition).
Also, although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. For example, many of the processes discussed above can be implemented in different methodologies and replaced by other processes, or a combination thereof.
Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention.

Claims (16)

What is claimed is:
1. A method for unlocking a locked computing device, the method comprising:
obtaining biometric information utilizing the computing device;
determining whether the biometric information meets a predetermined requirement;
unlocking the computing device when the biometric information obtained meets the predetermined requirement;
capturing an image of an external environment with a camera in the computing device to thereby obtain the biometric information;
allowing a user of the computing device to enable specific user authorization;
when the specific user authorization is enabled, detecting whether a facial profile exists in the image and matches a predetermined facial profile of an authorized user of the computing device to thereby determine whether the biometric information meets the predetermined requirement; and
when the specific user authorization is not enabled, detecting whether a facial profile exists in the image and is of a human face to thereby determine whether the biometric information meets the predetermined requirement.
2. The method of claim 1, further comprising:
maintaining a locked status of the computing device when the biometric information does not meet the predetermined requirement.
3. The method of claim 1, wherein the predetermined requirement comprises a facial profile existing in the image and being of a human face.
4. The method of claim 3, wherein the predetermined requirement further comprises the facial profile matching a predetermined facial profile of an authorized user of the computing device.
5. The method of claim 1, further comprising:
when the specific user authorization is enabled, and the facial profile does not match the predetermined facial profile of the authorized user of the computing device, adding the facial profile as a new authorized facial profile of the computing device and then unlocking the computing device if the user enters a specific password.
6. The method of claim 1, wherein the computing device is a mobile phone.
7. The method of claim 1, further comprising capturing a fingerprint image of a finger of the user utilizing a fingerprint reader to thereby obtain the biometric information.
8. The method of claim 7, wherein the predetermined requirement comprises the fingerprint image matching a predetermined fingerprint image of an authorized user of the computing device.
9. A computing device, comprising:
a sensor utilized for obtaining biometric information;
wherein the computing device is for determining whether the biometric information meets a predetermined requirement, and for unlocking the computing device when the biometric information obtained meets the predetermined requirement;
the sensor is a camera sensor utilized for capturing an image of an external environment to thereby obtain the biometric information
the computing device allows a user of the computing device to enable specific user authorization;
when the specific user authorization is enabled, the computing device is for detecting whether a facial profile exists in the image and matches a predetermined facial profile of an authorized user of the computing device to thereby determine whether the biometric information meets the predetermined requirement; and
when the specific user authorization is not enabled, the computing device is for detecting whether a facial profile exists in the image and is of a human face to thereby determine whether the biometric information meets the predetermined requirement.
10. The computing device of claim 9, wherein the computing device is further for maintaining a locked status of the computing device when the biometric information does not meet the predetermined requirement.
11. The computing device of claim 9, wherein the predetermined requirement comprises a facial profile existing in the image and being of a human face.
12. The computing device of claim 11, wherein the predetermined requirement further comprises the facial profile matching a predetermined facial profile of an authorized user of the computing device.
13. The computing device of claim 9, wherein when the specific user authorization is enabled, and the facial profile does not match the predetermined facial profile of the authorized user of the computing device, the computing device adds the facial profile as a new authorized facial profile of the computing device and then unlocks the computing device if the user enters a specific password.
14. The computing device of claim 9, wherein the computing device is a mobile phone.
15. The computing device of claim 9, wherein the sensor is a fingerprint reader utilized for capturing a fingerprint image of a finger of the user to thereby obtain the biometric information.
16. The computing device of claim 15, wherein the predetermined requirement comprises the fingerprint image matching a predetermined fingerprint image of an authorized user of the computing device.
US12/275,221 2007-12-25 2008-11-21 Method for unlocking a locked computing device and computing device thereof Active 2030-09-08 US8149089B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
TW096149914A TWI359381B (en) 2007-12-25 2007-12-25 Method for unlocking a locked computing device and
TW96149914A 2007-12-25
TW096149914 2007-12-25

Publications (2)

Publication Number Publication Date
US20090160609A1 US20090160609A1 (en) 2009-06-25
US8149089B2 true US8149089B2 (en) 2012-04-03

Family

ID=40787904

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/275,221 Active 2030-09-08 US8149089B2 (en) 2007-12-25 2008-11-21 Method for unlocking a locked computing device and computing device thereof

Country Status (2)

Country Link
US (1) US8149089B2 (en)
TW (1) TWI359381B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120280917A1 (en) * 2011-05-03 2012-11-08 Toksvig Michael John Mckenzie Adjusting Mobile Device State Based on User Intentions and/or Identity
US8396265B1 (en) * 2012-06-26 2013-03-12 Google Inc. Facial recognition
US20140010417A1 (en) * 2012-07-04 2014-01-09 Korea Advanced Institute Of Science And Technology Command input method of terminal and terminal for inputting command using mouth gesture
US9363264B2 (en) 2013-11-25 2016-06-07 At&T Intellectual Property I, L.P. Networked device access control
US9477829B2 (en) * 2011-03-16 2016-10-25 Apple Inc. Locking and unlocking a mobile device using facial recognition
US9633373B2 (en) 2011-10-19 2017-04-25 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10616464B2 (en) 2013-02-15 2020-04-07 Apple Inc. Apparatus and method for automatically activating a camera application based on detecting an intent to capture a photograph or a video
US11120110B2 (en) 2015-01-26 2021-09-14 Microsoft Technology Licensing, Llc. Authenticating a user with a mobile apparatus
US11388593B2 (en) 2012-05-23 2022-07-12 Maxell, Ltd. Mobile terminal and control method thereof

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8370639B2 (en) * 2005-06-16 2013-02-05 Sensible Vision, Inc. System and method for providing secure access to an electronic device using continuous facial biometrics
CN104200145B (en) 2007-09-24 2020-10-27 苹果公司 Embedded Verification System in Electronic Equipment
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
TW201113741A (en) * 2009-10-01 2011-04-16 Htc Corp Lock-state switching method, electronic apparatus and computer program product
TWI416366B (en) * 2009-10-12 2013-11-21 Htc Corp Method, electronic apparatus and computer program product for creating biologic feature data
US8457370B2 (en) 2011-01-20 2013-06-04 Daon Holdings Limited Methods and systems for authenticating users with captured palm biometric data
US8548206B2 (en) 2011-01-20 2013-10-01 Daon Holdings Limited Methods and systems for capturing biometric data
JP2012222612A (en) * 2011-04-08 2012-11-12 Nec Saitama Ltd Portable terminal
CN102761645B (en) * 2011-04-26 2016-05-18 富泰华工业(深圳)有限公司 Electronic equipment and control method thereof
US8638385B2 (en) 2011-06-05 2014-01-28 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9076008B1 (en) 2011-06-27 2015-07-07 Amazon Technologies, Inc. Content protection on an electronic device
US8627096B2 (en) 2011-07-14 2014-01-07 Sensible Vision, Inc. System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics
US9088661B2 (en) * 2011-08-02 2015-07-21 Genesys Telecommunications Laboratories, Inc. Hands-free voice/video session initiation using face detection
US9596084B2 (en) * 2011-09-09 2017-03-14 Facebook, Inc. Initializing camera subsystem for face detection based on sensor inputs
TWI446275B (en) * 2011-09-16 2014-07-21 Hon Hai Prec Ind Co Ltd Electronic device and monitoring method of utilizing
US8810367B2 (en) 2011-09-22 2014-08-19 Apple Inc. Electronic device with multimode fingerprint reader
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8769624B2 (en) 2011-09-29 2014-07-01 Apple Inc. Access control utilizing indirect authentication
US9519769B2 (en) * 2012-01-09 2016-12-13 Sensible Vision, Inc. System and method for disabling secure access to an electronic device using detection of a predetermined device orientation
US9633186B2 (en) * 2012-04-23 2017-04-25 Apple Inc. Systems and methods for controlling output of content based on human recognition data detection
US8441548B1 (en) * 2012-06-15 2013-05-14 Google Inc. Facial image quality assessment
US9286509B1 (en) * 2012-10-19 2016-03-15 Google Inc. Image optimization during facial recognition
KR102041984B1 (en) * 2012-12-18 2019-11-07 삼성전자주식회사 Mobile apparatus having function of face recognition with additional component
KR102013940B1 (en) * 2012-12-24 2019-10-21 삼성전자주식회사 Method for managing security for applications and an electronic device thereof
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
CN103617385B (en) * 2013-11-27 2016-04-06 福州瑞芯微电子股份有限公司 Realize terminal and the method for unlocking screen
WO2015099677A1 (en) * 2013-12-23 2015-07-02 Intel Corporation Computing device authentication based on user's hair follicle pattern
WO2015137788A1 (en) * 2014-03-14 2015-09-17 Samsung Electronics Co., Ltd. Electronic apparatus for providing health status information, method of controlling the same, and computer-readable storage medium
US9324067B2 (en) 2014-05-29 2016-04-26 Apple Inc. User interface for payments
US10372973B2 (en) 2014-06-23 2019-08-06 British Telecommunications Public Limited Company Biometric identification
EP3158500A1 (en) * 2014-06-23 2017-04-26 British Telecommunications Public Limited Company Biometric identification
US9684776B2 (en) 2014-07-29 2017-06-20 Google Inc. Allowing access to applications based on user authentication
US9639681B2 (en) 2014-07-29 2017-05-02 Google Inc. Allowing access to applications based on captured images
US9311464B2 (en) * 2014-08-19 2016-04-12 Airwatch, Llc Authentication via accelerometer
WO2016109936A1 (en) * 2015-01-06 2016-07-14 深圳市柔宇科技有限公司 Fingerprint unlocking system, electronic apparatus, and fingerprint unlocking method
WO2016146488A1 (en) * 2015-03-13 2016-09-22 SensoMotoric Instruments Gesellschaft für innovative Sensorik mbH Method for automatically identifying at least one user of an eye tracking device and eye tracking device
US20160358133A1 (en) 2015-06-05 2016-12-08 Apple Inc. User interface for loyalty accounts and private label accounts for a wearable device
US9940637B2 (en) 2015-06-05 2018-04-10 Apple Inc. User interface for loyalty accounts and private label accounts
CN105303090A (en) * 2015-10-19 2016-02-03 广东欧珀移动通信有限公司 Method, device and terminal for fingerprint unlocking
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
US10621581B2 (en) 2016-06-11 2020-04-14 Apple Inc. User interface for transactions
CN109313759B (en) 2016-06-11 2022-04-26 苹果公司 User interface for transactions
DK201670622A1 (en) 2016-06-12 2018-02-12 Apple Inc User interfaces for transactions
US9842330B1 (en) 2016-09-06 2017-12-12 Apple Inc. User interfaces for stored-value accounts
DK179978B1 (en) 2016-09-23 2019-11-27 Apple Inc. Image data for enhanced user interactions
US10496808B2 (en) 2016-10-25 2019-12-03 Apple Inc. User interface for managing access to credentials for use in an operation
EP3382937B1 (en) * 2017-03-28 2022-05-18 Rohde & Schwarz GmbH & Co. KG Transmission device, system as well as method for transmitting monitoring information
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
EP3514729B1 (en) * 2017-09-09 2022-09-28 Apple Inc. Implementation of biometric authentication without explicit authentication request from the user
JP6736686B1 (en) 2017-09-09 2020-08-05 アップル インコーポレイテッドApple Inc. Implementation of biometrics
US10444827B2 (en) * 2017-09-18 2019-10-15 Fujitsu Limited Platform for virtual reality movement
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
TWI820194B (en) * 2018-08-31 2023-11-01 日商索尼半導體解決方案公司 Electronic equipment and solid-state imaging devices
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11328352B2 (en) 2019-03-24 2022-05-10 Apple Inc. User interfaces for managing an account
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
EP4264460A1 (en) 2021-01-25 2023-10-25 Apple Inc. Implementation of biometric authentication
US12210603B2 (en) 2021-03-04 2025-01-28 Apple Inc. User interface for enrolling a biometric feature
US12216754B2 (en) 2021-05-10 2025-02-04 Apple Inc. User interfaces for authenticating to perform secure operations

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141436A (en) * 1998-03-25 2000-10-31 Motorola, Inc. Portable communication device having a fingerprint identification system
US20020145507A1 (en) * 2001-04-04 2002-10-10 Foster Ronald R. Integrated biometric security system
US20030095689A1 (en) * 2001-11-07 2003-05-22 Vollkommer Richard M. System and method for mobile biometric authentication
US20030115490A1 (en) * 2001-07-12 2003-06-19 Russo Anthony P. Secure network and networked devices using biometrics
US20040039909A1 (en) * 2002-08-22 2004-02-26 David Cheng Flexible authentication with multiple levels and factors
US6819219B1 (en) * 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
US6850147B2 (en) * 2001-04-02 2005-02-01 Mikos, Ltd. Personal biometric key
TW200509650A (en) 2003-08-18 2005-03-01 Primax Electronics Ltd Mobile phone with image recognition function
CN1588426A (en) 2004-07-23 2005-03-02 浙江华立通信集团有限公司 Biological key and biological lock
US20060104483A1 (en) * 2004-11-12 2006-05-18 Eastman Kodak Company Wireless digital image capture device with biometric readers
US7130453B2 (en) * 2000-08-09 2006-10-31 Matsushita Electric Industrial Co., Ltd. Eye position detection method and device
US7130454B1 (en) * 1998-07-20 2006-10-31 Viisage Technology, Inc. Real-time facial recognition and verification system
TWM305517U (en) 2006-08-02 2007-01-21 High Tech Comp Corp Handheld electronic apparatus
US7314167B1 (en) * 2005-03-08 2008-01-01 Pisafe, Inc. Method and apparatus for providing secure identification, verification and authorization
US20090158423A1 (en) * 2007-12-14 2009-06-18 Symbol Technologies, Inc. Locking mobile device cradle
US20090175506A1 (en) * 2002-12-31 2009-07-09 Polcha Andrew J Recoverable biometric identity system and method
US20090258667A1 (en) * 2006-04-14 2009-10-15 Nec Corporation Function unlocking system, function unlocking method, and function unlocking program
US7702314B2 (en) * 2003-07-05 2010-04-20 Lg Electronics Inc. Method and system for controlling access to a mobile communication terminal
US7925887B2 (en) * 2003-05-19 2011-04-12 Intellirad Solutions Pty Ltd. Multi-parameter biometric authentication
US7929946B2 (en) * 2005-05-24 2011-04-19 Rathus Spencer A Remote subscriber identification (RSID) system and method

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141436A (en) * 1998-03-25 2000-10-31 Motorola, Inc. Portable communication device having a fingerprint identification system
US7130454B1 (en) * 1998-07-20 2006-10-31 Viisage Technology, Inc. Real-time facial recognition and verification system
US7130453B2 (en) * 2000-08-09 2006-10-31 Matsushita Electric Industrial Co., Ltd. Eye position detection method and device
US6819219B1 (en) * 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
US6850147B2 (en) * 2001-04-02 2005-02-01 Mikos, Ltd. Personal biometric key
US20020145507A1 (en) * 2001-04-04 2002-10-10 Foster Ronald R. Integrated biometric security system
US20030115490A1 (en) * 2001-07-12 2003-06-19 Russo Anthony P. Secure network and networked devices using biometrics
US7512254B2 (en) * 2001-11-07 2009-03-31 Symbol Technologies, Inc. System and method for mobile biometric authentication
US20030095689A1 (en) * 2001-11-07 2003-05-22 Vollkommer Richard M. System and method for mobile biometric authentication
US20040039909A1 (en) * 2002-08-22 2004-02-26 David Cheng Flexible authentication with multiple levels and factors
US20090175506A1 (en) * 2002-12-31 2009-07-09 Polcha Andrew J Recoverable biometric identity system and method
US7925887B2 (en) * 2003-05-19 2011-04-12 Intellirad Solutions Pty Ltd. Multi-parameter biometric authentication
US7702314B2 (en) * 2003-07-05 2010-04-20 Lg Electronics Inc. Method and system for controlling access to a mobile communication terminal
TW200509650A (en) 2003-08-18 2005-03-01 Primax Electronics Ltd Mobile phone with image recognition function
CN1588426A (en) 2004-07-23 2005-03-02 浙江华立通信集团有限公司 Biological key and biological lock
US20060104483A1 (en) * 2004-11-12 2006-05-18 Eastman Kodak Company Wireless digital image capture device with biometric readers
US7314167B1 (en) * 2005-03-08 2008-01-01 Pisafe, Inc. Method and apparatus for providing secure identification, verification and authorization
US7929946B2 (en) * 2005-05-24 2011-04-19 Rathus Spencer A Remote subscriber identification (RSID) system and method
US20090258667A1 (en) * 2006-04-14 2009-10-15 Nec Corporation Function unlocking system, function unlocking method, and function unlocking program
TWM305517U (en) 2006-08-02 2007-01-21 High Tech Comp Corp Handheld electronic apparatus
US20090158423A1 (en) * 2007-12-14 2009-06-18 Symbol Technologies, Inc. Locking mobile device cradle

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Office action mailed on Jun. 27, 2011 for the Taiwan application No. 096149914, filed Dec. 25, 2007, p. 1-9.

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9477829B2 (en) * 2011-03-16 2016-10-25 Apple Inc. Locking and unlocking a mobile device using facial recognition
US10878069B2 (en) 2011-03-16 2020-12-29 Apple Inc. Locking and unlocking a mobile device using facial recognition
US9875349B2 (en) 2011-03-16 2018-01-23 Apple Inc. Locking and unlocking a mobile device using facial recognition
US20120280917A1 (en) * 2011-05-03 2012-11-08 Toksvig Michael John Mckenzie Adjusting Mobile Device State Based on User Intentions and/or Identity
US9229489B2 (en) * 2011-05-03 2016-01-05 Facebook, Inc. Adjusting mobile device state based on user intentions and/or identity
US9864425B2 (en) 2011-05-03 2018-01-09 Facebook, Inc. Adjusting mobile device state based on user intentions and/or identity
US9959555B2 (en) 2011-10-19 2018-05-01 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10896442B2 (en) 2011-10-19 2021-01-19 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US9639859B2 (en) 2011-10-19 2017-05-02 Firstface Co., Ltd. System, method and mobile communication terminal for displaying advertisement upon activation of mobile communication terminal
US9779419B2 (en) 2011-10-19 2017-10-03 Firstface Co., Ltd. Activating display and performing user authentication in mobile terminal with one-time user input
US12159299B2 (en) 2011-10-19 2024-12-03 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US9633373B2 (en) 2011-10-19 2017-04-25 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US9978082B1 (en) 2011-10-19 2018-05-22 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US11551263B2 (en) 2011-10-19 2023-01-10 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10510097B2 (en) 2011-10-19 2019-12-17 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US11924633B2 (en) 2012-05-23 2024-03-05 Maxell, Ltd. Mobile terminal and control method thereof
US11388593B2 (en) 2012-05-23 2022-07-12 Maxell, Ltd. Mobile terminal and control method thereof
US9158904B1 (en) 2012-06-26 2015-10-13 Google Inc. Facial recognition
US8396265B1 (en) * 2012-06-26 2013-03-12 Google Inc. Facial recognition
US20140010417A1 (en) * 2012-07-04 2014-01-09 Korea Advanced Institute Of Science And Technology Command input method of terminal and terminal for inputting command using mouth gesture
US10616464B2 (en) 2013-02-15 2020-04-07 Apple Inc. Apparatus and method for automatically activating a camera application based on detecting an intent to capture a photograph or a video
US10097543B2 (en) 2013-11-25 2018-10-09 At&T Intellectual Property I, L.P. Networked device access control
US9363264B2 (en) 2013-11-25 2016-06-07 At&T Intellectual Property I, L.P. Networked device access control
US11120110B2 (en) 2015-01-26 2021-09-14 Microsoft Technology Licensing, Llc. Authenticating a user with a mobile apparatus

Also Published As

Publication number Publication date
TWI359381B (en) 2012-03-01
US20090160609A1 (en) 2009-06-25
TW200929007A (en) 2009-07-01

Similar Documents

Publication Publication Date Title
US8149089B2 (en) Method for unlocking a locked computing device and computing device thereof
US8191161B2 (en) Wireless authentication
US8723643B2 (en) Method and computer program product of switching locked state of electronic device
KR101438869B1 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
EP3471070A1 (en) Configurable digital badge holder
US20130067566A1 (en) Device to perform authentication according to surrounding information and method for performing authentication
US20130326613A1 (en) Dynamic control of device unlocking security level
WO2016188230A1 (en) Unlocking method and device
US20080244730A1 (en) Security capability with an input device
JP2010257060A (en) Authentication system and authentication method
US9542547B2 (en) Identification to access portable computing device
CN106919306A (en) Method into application interface and the system into application interface
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
JP5119801B2 (en) Portable information terminal, portable information terminal authentication method, and portable information terminal authentication program
KR101392113B1 (en) Fingerprint locking system
CN102637114B (en) Data processing device, system and method for realizing touch unlocking
CN106611110A (en) Identity verification method and system
US20180239884A1 (en) Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof
CN102592099A (en) Security identification method and electronic device thereof
CN106445266A (en) A mobile phone glass window protective screen fingerprint recognition component and preparation method thereof
KR20100012124A (en) Real time method and system for managing pc security using face recognition
CN103198246B (en) Start the system of electronic installation
CN101493883B (en) Method and computing device for unlocking locked computing device
JP2007306350A (en) Security function of portable communication terminal
KR20140035757A (en) Home screen display method, user device using the same and computer-readable storage

Legal Events

Date Code Title Description
AS Assignment

Owner name: HTC CORPORATION,TAIWAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIN, JIAN-LIANG;WANG, JOHN C.;REEL/FRAME:021870/0581

Effective date: 20081118

Owner name: HTC CORPORATION, TAIWAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIN, JIAN-LIANG;WANG, JOHN C.;REEL/FRAME:021870/0581

Effective date: 20081118

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载